US8914481B2 - Spontaneous resource management - Google Patents
Spontaneous resource management Download PDFInfo
- Publication number
- US8914481B2 US8914481B2 US12/258,181 US25818108A US8914481B2 US 8914481 B2 US8914481 B2 US 8914481B2 US 25818108 A US25818108 A US 25818108A US 8914481 B2 US8914481 B2 US 8914481B2
- Authority
- US
- United States
- Prior art keywords
- managed
- services
- service
- repository
- search
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0893—Assignment of logical groups to network elements
Definitions
- the managed systems are often discrete and are capable of acting in concert with other services for providing higher-level composite services. Also, these systems are of various hardware architectures and operating systems, which operate within heterogeneous environments and which offer individual services on presumably the most efficient, reliable, or cost effective architectural platforms.
- an organization's managed system may often include many isolated data centers and workgroup productivity centers deployed as duplicate and redundant servers and services. This is done by the enterprise, without really knowing what is already available.
- a new server needs to be deployed having a certain version of an operating system, which supports a unique application and that can only run on a particular device; but, again, the application acts in a coordinated manner with other services that are deployed within the organization.
- n-tier systems are well understood within the industry, but require real systems to deploy them.
- the fastest performing web server is an Apache running on an openSUSE Linux server
- the best authentication server is Novell eDirectory® running on a NetWare® 6.5 server
- the best middle tier application server is some custom application running on Novell SLES 10
- the database server is an Oracle® database running on Solaris® on a Sun® server.
- processors are IA32 or IA64 and some are SPARC®.
- Some Operating Systems (OS's) are closed source and proprietary, while some are open source.
- a certain department within the organization decides to deploy these servers and services, but they must be maintained and supported and so the organization hires a variety of qualified staff to monitor these servers and services.
- the hired systems managers often use proprietary, open source, and open standards-based tools such as OpenView, DMTF CIMOM, SNMP, iManager, YaST, command line tools, scripts, and/or other tools to monitor and manage the servers and services.
- a method for dynamic resource management is provided. More specifically, and in an embodiment, a method is provided for dynamic resource management. Broadcast messages are regularly received from managed services of an enterprise over a network. The broadcast messages are indexed in a repository. A management tool subsequently permits searches to be executed against the repository for purposes of selectively identifying particular ones of the managed services that collectively form a managed group of services that the management tool dynamically manages.
- FIG. 1 is a diagram of a method for dynamic resource management, according to an example embodiment.
- FIG. 2 is a diagram of another method for spontaneous resource management, according to an example embodiment.
- FIG. 3 is a diagram of spontaneous resource management system, according to an example embodiment.
- FIG. 4 is a diagram of another spontaneous resource management system according to an example embodiment.
- a “resource” includes a user, content, a processing device, a node, a service, an application, a system, a directory, a data store, groups of users, combinations of these things, etc. Resources can interact with each other and can either act on other resource or be acted upon by other resources.
- the term “service” and “application” may be used interchangeably herein and refer to a type of software resource that includes instructions, which when executed by a machine performs operations that change the state of the machine and that may produce output.
- a resource is recognized via an “identity.”
- An identity is authenticated via various techniques (e.g., challenge and response interaction, cookies, assertions, etc.) that use various identifying information (e.g., identifiers with passwords, biometric data, hardware specific data, digital certificates, digital signatures, etc.).
- identifying information e.g., identifiers with passwords, biometric data, hardware specific data, digital certificates, digital signatures, etc.
- a “true identity” is one that is unique to a resource across any context that the resource may engage in over a network (e.g., Internet, Intranet, etc.).
- each resource may have and manage a variety of identities, where each of these identities may only be unique within a given context (given service interaction, given processing environment, given virtual processing environment, etc.).
- managed resource may be used interchangeably and synonymously herein and below.
- These are special resources that are managed and monitored by a network administrator. These can include such things as servers, proxies, storage devices, email services, etc.
- the resources that are managed are dispersed over a network, such as the Internet and/or an enterprise Intranet, etc.
- the managed resources are dynamic such that they change and evolve in real time as conditions change with them on the network.
- the resources self-populate dynamically defined managed resource groups and add and remove themselves from groups as circumstances warrant.
- Various embodiments of this invention can be implemented in existing network architectures, security systems, data centers, and/or communication devices.
- the techniques presented herein are implemented in whole or in part in the Novell® network, proxy server products, email products, operating system products, data center products, and/or directory services products distributed by Novell®, Inc., of Provo, Utah.
- FIG. 1 is a diagram of a method 100 for spontaneous resource management, according to an example embodiment.
- the method 100 (hereinafter “information collection service”) is implemented as instructions in a machine-accessible and computer-readable storage medium. The instructions when executed by a machine (computer or processor-enabled device) perform the processing depicted in FIG. 1 .
- the information collection service is also operational over and processes within a network.
- the network may be wired, wireless, or a combination of wired and wireless.
- the information collection service regularly receives broadcast messages from managed services or an enterprise over the network.
- the broadcast messages can include a variety of information, such as standards being used with the managed services (Distributed Management Task Force (DMTF), Common Information Manager Object Model (CIMOM), Simple Network Management Protocol (SNMP), etc.).
- DMTF Distributed Management Task Force
- CIMOM Common Information Manager Object Model
- SNMP Simple Network Management Protocol
- the broadcast messages can also indicate who the managed services are and what they are doing. For example, I am IA32 Intel® 586 server that is loaded with openSUSE® 10.3 and I am running Apache 2.1.2 on ports 80 and 443 .
- the information collection service receives the broadcast messages as part of a heartbeat message from servers that process the managed services.
- the servers may periodically broadcast heartbeat messages indicating that they are up and running to the other remaining servers.
- the broadcast messages can be part of that heartbeat message.
- the information collection service collects the broadcast messages. In some cases, all the information that is advertised by the managed services is contained in the broadcast messages. In another case, at 112 , the information collection service periodically performs queries against the managed services and/or their processing environments to acquire additional information for each of the managed services. This additional information is also indexed within the repository with the broadcast messages (discussed below) and made available to the searches of a management tool (also discussed below).
- the information collection service can be configured to inspect install logs and comments located in headers and source code associated with each of the managed services when the queries are performed. So, the information collection service targets specific files, directories, and/or metadata within the processing environments of the managed services to collect the additional information.
- an entire file, document and/or comments from the processing environment or managed service are grabbed by the information collection service and no real query is performed at all; rather, the whole text version of these entities are used as the additional information.
- free-form text as inputted by personnel associated with the managed services can be captured in its unadulterated format, such as a note from an administrative person that the person made to himself or herself, install read me files, etc.
- the information captured by the information collection service can be viewed as similar to a blog or social networking site, but the information is related to a managed resource and not a person (as would be the case with a blog or social networking site).
- the information is not modified and is retained by the information collection service.
- the information collection service indexes the broadcast messages in a repository that is managed by the information collection service.
- the information collection service uses a World-Wide Web (WWW) search engine, such as Google®, for performing the indexing within the repository.
- WWW World-Wide Web
- a management tool (discussed below) subsequently uses the search engine to perform a search of the repository (also discussed below).
- the information collection service maintains the repository as one or more of the following: a file, a set of files, a directory, a set of directories, a relational database, a set of relational databases organized as a data warehouse, a dynamically maintained document, a set of dynamically maintained documents, an object, a set of objects, an object-oriented database, a set of object-oriented databases, and/or one or more hybrid databases.
- the information collection service subsequently permits a management tool to search the repository for purposes of selectively identifying particular ones of the managed services to form a managed group of services that the management tool dynamically manages.
- the management tool searches the repository that this provided and managed by the information collection service to identify particular managed resources. These managed resources are organized as a self-managed group and presented as a logical entity within the management tool for the management tool to monitor and manage.
- the search can be custom defined, predefined, previously saved, ad hoc, etc.
- members (services) of the managed group can dynamically change, such that new members are added and/or existing members are deleted from the managed group. This can occur via periodically executing the search.
- the search is registered with the information collection service and when the information collection service detects an addition or deletion the management tool is automatically notified via a change in the membership of the managed group. So, members can chaotically change within the managed group.
- the information collection service also returns a relevancy rating for each particular managed service. This is done when the management tool performs the search against the repository. The management tool can then selectively pick each member of the managed group in response to the relevancy rating. For example, consider a search of the repository that uses Google®, a percentage for relevancy can be automatically provided. Policies can also be used such that when a relevancy rating exceeds a threshold value (e.g., 80%) the managed service associated with the result is automatically added to the managed group.
- a threshold value e.g., 80%
- the search can result in automatic managed group population or can result in a semi or partially populated group that can be completely populated by an administrator that interacts with the management tool and views the results from the search.
- the information that is stored in the repository is associated with particular managed services.
- the answer set returned with the search can include links to the full content associated with a match in its native location on a particular managed service or in a copy of the full content maintained within the repository.
- FIG. 2 is a diagram of another method 200 for spontaneous resource management, according to an example embodiment.
- the method 200 (hereinafter “resource manager” is implemented in a machine-accessible and readable medium as instructions. The instructions when executed by a machine perform the processing depicted in the FIG. 2 .
- the resource manager is operational over a network, and the network may be wired, wireless, or a combination of wired and wireless.
- the resource manager presents a perspective of dynamic resource management from an administrator's client device whereas the information collection service (represented by the method 100 of the FIG. 1 ) presented the perspective of a repository that dynamically collects information about managed resources. So, the resource manager interacts with the information collection service to dynamically define and manage resources.
- the resource manager receives search criteria (custom, ad hoc, previously saved, etc.).
- the search criteria define a dynamic group of services that are to assemble or to be assembled and managed/monitored on the network.
- the resource manager receives the search criteria as free form text that is entered into a search bar of a management tool interface by a network administrator.
- the resource manager is the management tool and provides the search bar or menu option to the network administrator.
- the search criteria can be entered as a Structured Query Language (SQL) format by the network administrator.
- SQL Structured Query Language
- the resource manager permits a network administrator to browse an index of information associated with network services for purposes of interactively defining the search criteria.
- the resource manager acquires a hierarchy of information from a self-organizing server.
- the hierarchy is presented to the network administrator and the network administrator can navigate and interact with the hierarchy for purposes of defining the search criteria. So, different views of the information about the networked services can be maintained at the self-organizing server and the network administrator can navigate and view that information via categories, topics, classifications, etc.
- the resource manager submits the search criteria to a self-organizing server over the network.
- Example processing associated with the self-organizing server was presented above with reference to the method 100 of the FIG. 1 .
- the resource manager forms the dynamic group in response to an answer set that is returned from the self-organizing server that identifies each service as conforming to the search criteria. That is, the search defining the search criteria when executed by the self-organizing server reveals an answer set. That answer set includes the identities of particular managed services and those particular managed services form the dynamic group that is to be managed over the network.
- the resource manager periodically re-submits the search criteria to the self-organizing server to dynamically update members of the dynamic group.
- a policy may indicate how frequently the search is re-submitted.
- this can be compared to the search criteria (via the self-organizing server) and the dynamic group of services automatically updated as needed.
- the resource manager dynamically removes at least one service from the dynamic group in response to an updated answer set received from the self-organizing server.
- the updated answer set excludes that particular service such that when compared to the previous answer set it is noted that the particular service is being dynamically removed.
- the resource manager dynamically adds at least one new service from the dynamic group of services in response to an updated answer set received from the self-organizing server. Again, the updated answer set reveals an addition of the particular service when compared to the previous answer set.
- the dynamic group is updated as conditions change on the network. So, should a particular service change its processing environment or configuration such that it is now not considered a member of the managed group in view of the defined search criteria, then the particular service is automatically and dynamically removed from the managed group.
- a network administrator interacts with the resource manager to define some search criteria that is provided to the self-organizing server.
- the search criteria define a new group or relationship between some managed servers/services.
- the group is not a static one time effort, rather the group is an ongoing and dynamic grouping of servers or services that match the criteria, such that servers or services are regularly added or dropped from the group in real time and on-the-fly (as the changes occur within the network).
- an administrator wants all servers that have Apache® or IIS and that are not configured with a firewall. The administrator points this query at the self-organizing server and watches to see if any servers pop up that meet the criteria and then he/she can take the appropriate management action.
- Management tools are used to browse the index of or search the self-organizing server so as to see who is up and what is going on and to dynamically create and organize groups of servers/services based on current conditions, rather than based on some predefined and hardcoded structure in a management tool.
- FIG. 3 is a diagram of spontaneous resource management system 300 , according to an example embodiment.
- the spontaneous resource management system 300 is implemented in a machine-accessible and computer-readable storage medium as instructions.
- the instructions when executed by a machine (computer or processor-enabled device) perform the processing depicted in the FIGS. 1 and 2 .
- the spontaneous resource management system 300 is operational over a network, and the network may be wired, wireless, or a combination of wired and wireless.
- the spontaneous resource management system 300 includes a self-organizing server 301 and a management tool 302 . Each of these and their interactions with one another will now be discussed in turn.
- the self-organizing server 301 is implemented in a computer-readable storage medium as instructions that process on server machine (computer or processor-enabled device). Example processing associated with the self-organizing server 301 was presented above with reference to the method 100 of the FIG. 1 .
- the self-organizing server 301 collects information, which is associated with managed services or systems of an enterprise.
- the self-organizing server 301 passively receives broadcast messages having the information.
- the broadcast messages are broadcast by each of the managed services over the network.
- the self-organizing server 301 actively scrapes metadata from the managed services to gather some of the information.
- the self-organizing server 301 indexes the information in a repository. Also, the self-organizing server 301 permits the management tool 302 to use a WWW search engine to formulate and execute the search.
- the management tool 302 is implemented in a computer-readable storage medium as instructions that process on a client machine (computer or processor-enabled device) of a network administrator. Example processing associated with the management tool 302 was presented in detail above with reference to the method 200 of the FIG. 2 .
- the management tool 302 is used to search the information housed at the self-organizing server 301 for purposes of dynamically and selectively populating a managed group of the managed services or systems.
- the management tool 302 presents an interactive interface to a network administrator for purposes of defining the search and to select and define the managed group.
- the management tool 302 may permit a search to be defined or permit the search to be automatically built via browsing an index or hierarchy of information related to the managed services and maintained by the self-organizing server 301 .
- FIG. 4 is a diagram of another spontaneous resource management system 400 according to an example embodiment.
- the spontaneous resource management system 400 is implemented as instructions on or within a machine-accessible and computer-readable storage medium.
- the instructions when executed by one or more machines (computer(s) or processor-enabled device(s)) perform various aspects of the processing depicted with respect to the methods 100 and 200 of the FIGS. 1 and 2 , respectively; and the system 300 of the FIG. 3 .
- the spontaneous resource management system 400 is also operational over a network and the network may be wired, wireless, or a combination of wired and wireless.
- the spontaneous resource management system 400 includes a collection of managed resources 401 and a repository 402 . Each of these components and their interactions with one another will now be discussed in turn.
- Each resource of the collection of managed resources 401 is implemented in a computer-readable storage medium as instructions and is to be processed by a machine (computer or processor-enabled device) over the network.
- Example aspects of the collection of managed resources 401 were presented above in detail with reference to the methods 100 and 200 of the FIGS. 1 and 2 , respectively, and with respect to the system 300 of the FIG. 3 .
- the collection of managed resources 401 is dynamically defined via a search that is formulated via a management tool, such as the management tool 302 of the system 300 and depicted in FIG. 3 .
- the collection of managed resources 401 is dynamically modified by deleting a member or by adding a new member when conditions related to the search warrant modification to the collection of managed resources 401 .
- the collection of managed resources 401 is dynamically and in real time modified to remove that particular member.
- the collection of managed resources 401 can be dynamically modified by adding a new member that adds information that conforms to the search.
- the repository 402 is implemented in a computer-readable storage medium and is accessible to the managed resources and to other resources of the network. Some example aspects of the repository 402 were presented in detail above with reference to the methods 100 and 200 of the FIGS. 1 and 2 , respectively, and with respect to the system 300 of the FIG. 3 .
- reach of the managed resources publish or advertise information that is captured in the repository.
- the search matches the information in the repository.
- the information is at least partially dynamically culled from each of the managed resources.
- the information for each of the managed resources is indexed within the repository and compared against search criteria when the search is executed.
Abstract
Description
-
- Web server(s)
- Authentication server(s)
- Middle-tier application server(s)
- Database server(s)
- And other such components.
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/258,181 US8914481B2 (en) | 2008-10-24 | 2008-10-24 | Spontaneous resource management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/258,181 US8914481B2 (en) | 2008-10-24 | 2008-10-24 | Spontaneous resource management |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100106834A1 US20100106834A1 (en) | 2010-04-29 |
US8914481B2 true US8914481B2 (en) | 2014-12-16 |
Family
ID=42118556
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/258,181 Expired - Fee Related US8914481B2 (en) | 2008-10-24 | 2008-10-24 | Spontaneous resource management |
Country Status (1)
Country | Link |
---|---|
US (1) | US8914481B2 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8988708B2 (en) | 2010-08-18 | 2015-03-24 | Samsung Electronics Co., Ltd. | Host device to monitor status of image forming apparatus and control method thereof |
US10725831B2 (en) | 2014-10-08 | 2020-07-28 | Hewlett Packard Enterprise Development Lp | Resource federation |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5857195A (en) | 1990-08-31 | 1999-01-05 | Fujitsu Limited | Method of developing and modifying self-describing database management system to generate a new database management system from an existing database management system |
US20020184357A1 (en) * | 2001-01-22 | 2002-12-05 | Traversat Bernard A. | Rendezvous for locating peer-to-peer resources |
US20030023712A1 (en) * | 2001-03-30 | 2003-01-30 | Zhao Ling Z. | Site monitor |
US6625643B1 (en) * | 1998-11-13 | 2003-09-23 | Akamai Technologies, Inc. | System and method for resource management on a data network |
US20040111315A1 (en) * | 2002-10-16 | 2004-06-10 | Xerox Corporation | Device model agent |
US20050015471A1 (en) * | 2003-07-18 | 2005-01-20 | Zhang Pu Paul | Secure cluster configuration data set transfer protocol |
US20050050225A1 (en) * | 2003-08-29 | 2005-03-03 | Tatman Lance A. | System and method for discovery of BGP router topology |
US20050289110A1 (en) * | 2004-06-25 | 2005-12-29 | Dominic Giampaolo | Trusted index structure in a network environment |
US6990440B1 (en) | 2000-08-16 | 2006-01-24 | Alexander Sroka | Self-organizing and automatically cross-referencing information management system |
US20060041660A1 (en) * | 2000-02-28 | 2006-02-23 | Microsoft Corporation | Enterprise management system |
US20060246879A1 (en) * | 2005-04-29 | 2006-11-02 | Microsoft Corporation | Dynamic utilization of condensing metadata |
US20070088814A1 (en) * | 2005-10-18 | 2007-04-19 | Canon Kabushiki Kaisha | Network management server, control method, computer program, computer readable storage medium, and network system |
US20070214097A1 (en) * | 2006-02-28 | 2007-09-13 | Todd Parsons | Social analytics system and method for analyzing conversations in social media |
US20080013566A1 (en) | 2006-07-05 | 2008-01-17 | Smith David M | Self-organized and self-managed ad hoc communications network |
US20080056269A1 (en) * | 2006-09-05 | 2008-03-06 | Motorola, Inc. | Methods and devices for standalone social networking and internet protocol communication setup |
US20080083031A1 (en) * | 2006-12-20 | 2008-04-03 | Microsoft Corporation | Secure service computation |
US20080133747A1 (en) | 2006-11-21 | 2008-06-05 | Fish Russell H | System to self organize and manage computer users |
US20080147487A1 (en) * | 2006-10-06 | 2008-06-19 | Technorati Inc. | Methods and apparatus for conversational advertising |
US7433945B2 (en) | 2002-04-24 | 2008-10-07 | International Business Machines Corporation | Dynamic configuration and self-tuning of inter-nodal communication resources in a database management system |
US20110022602A1 (en) * | 2007-08-17 | 2011-01-27 | Google Inc. | Ranking Social Network Objects |
US7886033B2 (en) * | 2004-12-07 | 2011-02-08 | Cisco Technology, Inc. | Network administration tool employing a network administration protocol |
-
2008
- 2008-10-24 US US12/258,181 patent/US8914481B2/en not_active Expired - Fee Related
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5857195A (en) | 1990-08-31 | 1999-01-05 | Fujitsu Limited | Method of developing and modifying self-describing database management system to generate a new database management system from an existing database management system |
US6625643B1 (en) * | 1998-11-13 | 2003-09-23 | Akamai Technologies, Inc. | System and method for resource management on a data network |
US20060041660A1 (en) * | 2000-02-28 | 2006-02-23 | Microsoft Corporation | Enterprise management system |
US6990440B1 (en) | 2000-08-16 | 2006-01-24 | Alexander Sroka | Self-organizing and automatically cross-referencing information management system |
US20020184357A1 (en) * | 2001-01-22 | 2002-12-05 | Traversat Bernard A. | Rendezvous for locating peer-to-peer resources |
US20030023712A1 (en) * | 2001-03-30 | 2003-01-30 | Zhao Ling Z. | Site monitor |
US7433945B2 (en) | 2002-04-24 | 2008-10-07 | International Business Machines Corporation | Dynamic configuration and self-tuning of inter-nodal communication resources in a database management system |
US20040111315A1 (en) * | 2002-10-16 | 2004-06-10 | Xerox Corporation | Device model agent |
US20050015471A1 (en) * | 2003-07-18 | 2005-01-20 | Zhang Pu Paul | Secure cluster configuration data set transfer protocol |
US20050050225A1 (en) * | 2003-08-29 | 2005-03-03 | Tatman Lance A. | System and method for discovery of BGP router topology |
US20050289110A1 (en) * | 2004-06-25 | 2005-12-29 | Dominic Giampaolo | Trusted index structure in a network environment |
US7886033B2 (en) * | 2004-12-07 | 2011-02-08 | Cisco Technology, Inc. | Network administration tool employing a network administration protocol |
US20060246879A1 (en) * | 2005-04-29 | 2006-11-02 | Microsoft Corporation | Dynamic utilization of condensing metadata |
US20070088814A1 (en) * | 2005-10-18 | 2007-04-19 | Canon Kabushiki Kaisha | Network management server, control method, computer program, computer readable storage medium, and network system |
US20070214097A1 (en) * | 2006-02-28 | 2007-09-13 | Todd Parsons | Social analytics system and method for analyzing conversations in social media |
US20080013566A1 (en) | 2006-07-05 | 2008-01-17 | Smith David M | Self-organized and self-managed ad hoc communications network |
US20080056269A1 (en) * | 2006-09-05 | 2008-03-06 | Motorola, Inc. | Methods and devices for standalone social networking and internet protocol communication setup |
US20080147487A1 (en) * | 2006-10-06 | 2008-06-19 | Technorati Inc. | Methods and apparatus for conversational advertising |
US20080133747A1 (en) | 2006-11-21 | 2008-06-05 | Fish Russell H | System to self organize and manage computer users |
US20080083031A1 (en) * | 2006-12-20 | 2008-04-03 | Microsoft Corporation | Secure service computation |
US20110022602A1 (en) * | 2007-08-17 | 2011-01-27 | Google Inc. | Ranking Social Network Objects |
Also Published As
Publication number | Publication date |
---|---|
US20100106834A1 (en) | 2010-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11637762B2 (en) | MDL-based clustering for dependency mapping | |
US10938845B2 (en) | Detection of user behavior deviation from defined user groups | |
US20200007561A1 (en) | Interactive geographic representation of network security threats | |
US7904456B2 (en) | Security monitoring tool for computer network | |
US20190182101A1 (en) | Log file processing for root cause analysis of a network fabric | |
US20030131093A1 (en) | System for generating usage data in a distributed information processing environment and method therefor | |
US8640251B1 (en) | Methods and systems for classifying computer documents into confidential levels using log information | |
US8898272B1 (en) | Identifying information in resource locators | |
US20080263009A1 (en) | System and method for sharing of search query information across organizational boundaries | |
US10404731B2 (en) | Method and device for detecting website attack | |
US11503063B2 (en) | Systems and methods for detecting hidden vulnerabilities in enterprise networks | |
EP4205357A1 (en) | Api key security posture scoring for microservices to determine microservice security risks | |
US8914481B2 (en) | Spontaneous resource management | |
US11627166B2 (en) | Scope discovery and policy generation in an enterprise network | |
US20210392165A1 (en) | Application protectability schemes for enterprise applications | |
US11895156B2 (en) | Securing network resources from known threats | |
US11765046B1 (en) | Endpoint cluster assignment and query generation | |
Mokhov et al. | Automating MAC spoofer evidence gathering and encoding for investigations | |
US11915044B2 (en) | Distributed task assignment in a cluster computing system | |
Drakopoulos et al. | Performance study of client-server storage systems | |
Stoddard et al. | Tanium reveal: a federated search engine for querying unstructured file data on large enterprise networks | |
Jash et al. | A hierarchical approach to extract application logs with visualization in a containerized environment | |
Zohuri et al. | Business Resilience System Topology of Hardware and Software | |
Patt | Methodologies for experimental research in computer architecture and performance measurement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NOVELL, INC.,UTAH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ISAACSON, SCOTT ALAN;CARTER, STEPHEN R;GREEN, TAMMY ANITA;SIGNING DATES FROM 20081021 TO 20081024;REEL/FRAME:021909/0548 Owner name: NOVELL, INC., UTAH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ISAACSON, SCOTT ALAN;CARTER, STEPHEN R;GREEN, TAMMY ANITA;SIGNING DATES FROM 20081021 TO 20081024;REEL/FRAME:021909/0548 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST;ASSIGNOR:NOVELL, INC.;REEL/FRAME:026270/0001 Effective date: 20110427 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST (SECOND LIEN);ASSIGNOR:NOVELL, INC.;REEL/FRAME:026275/0018 Effective date: 20110427 |
|
AS | Assignment |
Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST IN PATENTS FIRST LIEN (RELEASES RF 026270/0001 AND 027289/0727);ASSIGNOR:CREDIT SUISSE AG, AS COLLATERAL AGENT;REEL/FRAME:028252/0077 Effective date: 20120522 Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY IN PATENTS SECOND LIEN (RELEASES RF 026275/0018 AND 027290/0983);ASSIGNOR:CREDIT SUISSE AG, AS COLLATERAL AGENT;REEL/FRAME:028252/0154 Effective date: 20120522 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, AS COLLATERAL AGENT, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST SECOND LIEN;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028252/0316 Effective date: 20120522 Owner name: CREDIT SUISSE AG, AS COLLATERAL AGENT, NEW YORK Free format text: GRANT OF PATENT SECURITY INTEREST FIRST LIEN;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028252/0216 Effective date: 20120522 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0316;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:034469/0057 Effective date: 20141120 Owner name: NOVELL, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0216;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:034470/0680 Effective date: 20141120 |
|
CC | Certificate of correction | ||
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNORS:MICRO FOCUS (US), INC.;BORLAND SOFTWARE CORPORATION;ATTACHMATE CORPORATION;AND OTHERS;REEL/FRAME:035656/0251 Effective date: 20141120 |
|
AS | Assignment |
Owner name: MICRO FOCUS SOFTWARE INC., DELAWARE Free format text: CHANGE OF NAME;ASSIGNOR:NOVELL, INC.;REEL/FRAME:040020/0703 Effective date: 20160718 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT, NEW Free format text: NOTICE OF SUCCESSION OF AGENCY;ASSIGNOR:BANK OF AMERICA, N.A., AS PRIOR AGENT;REEL/FRAME:042388/0386 Effective date: 20170501 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE Free format text: SECURITY INTEREST;ASSIGNORS:ATTACHMATE CORPORATION;BORLAND SOFTWARE CORPORATION;NETIQ CORPORATION;AND OTHERS;REEL/FRAME:044183/0718 Effective date: 20170901 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT, NEW Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE TO CORRECT TYPO IN APPLICATION NUMBER 10708121 WHICH SHOULD BE 10708021 PREVIOUSLY RECORDED ON REEL 042388 FRAME 0386. ASSIGNOR(S) HEREBY CONFIRMS THE NOTICE OF SUCCESSION OF AGENCY;ASSIGNOR:BANK OF AMERICA, N.A., AS PRIOR AGENT;REEL/FRAME:048793/0832 Effective date: 20170501 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.) |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20181216 |
|
AS | Assignment |
Owner name: NETIQ CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: ATTACHMATE CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: SERENA SOFTWARE, INC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS (US), INC., MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: BORLAND SOFTWARE CORPORATION, MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS LLC (F/K/A ENTIT SOFTWARE LLC), CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399 Effective date: 20230131 Owner name: MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 Owner name: MICRO FOCUS (US), INC., MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 Owner name: NETIQ CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 Owner name: ATTACHMATE CORPORATION, WASHINGTON Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 Owner name: BORLAND SOFTWARE CORPORATION, MARYLAND Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009 Effective date: 20230131 |